Privacy Consumer Protection Business Organization

Read Privacy Law updates, news, and legal commentary from leading lawyers and law firms:
News & Analysis as of

Best Practices for Sharing Threat Indicators with the Government

After a security incident is identified organizations often consider whether to share information concerning the incident with government agencies. If the incident involved criminal conduct, federal law enforcement agencies –...more

In Case You Missed It: Launch Links - Week of January 31, 2016

Some interesting links we found across the web this week: The State of Venture Capital - How much VC money is out there, and where is it coming from? Click through to the full presentation for a detailed...more

In Case You Missed It: Launch Links - Week of January 24, 2016

Some interesting links we found across the web this week: - Last-minute change to privacy bill adds tension to US-EU negotiations - Privacy law is easy for companies to overlook until a problem arises, and even more so...more

FTC’s PrivacyCon Highlights Consumer Privacy Perceptions and Targeting

The Federal Trade Commission is currently the most aggressive enforcement agency on privacy and data security. The agency kicked off 2016 with PrivacyCon on January 14, which put the spotlight on academic research on consumer...more

International Data Privacy: How to Navigate the Challenges

Hardly a day goes by when the news doesn't include some privacy-related story or scandal. To name just a few recent examples, we've seen: ..Highly publicized losses of customer credit card data by household-name...more

Key CISA Provisions Impacting Private Entities

On December 18, 2015, President Obama signed the Cybersecurity Information Sharing Act (“CISA”), which was the culmination of intense negotiations that reconciled three separate cybersecurity bills passed by the U.S. Senate...more

Year in Review: Legislation and Guidance for Financial Institutions in 2015

Financial institutions in Canada witnessed yet another year of significant growth in legislation and regulatory guidance impacting their operations, while the financial marketplace is continuing to adapt to the impact of...more

How to Conduct a Data Inventory

Knowing the type of data that you collect, where it is being held, with whom it is being shared, and how it is being transferred is a central component of most data privacy and data security programs. The process of answering...more

Federal Trade Commission PrivacyCon 2016 Recap: Insights into the FTC’s Perspective on Privacy and Data Security

The Federal Trade Commission’s PrivacyCon event brings together the FTC, researchers and academics to discuss the latest research and trends related to consumer privacy and data security. Much of the discussion today...more

Director Cybersecurity Risk Oversight and Actions

This article begins by providing an overview of the duty of directors to oversee risk, including cybersecurity risk, in the cyberattack context and then outlines actions that board of directors are taking as reported by...more

Cybersecurity Risks: Directors and Officers Should Stop, Collaborate and Listen

The risks associated with cyber-attacks and data breaches are growing in Canada and internationally and the costs associated with an organization preventing, detecting, responding to and recovering from such an incident can...more

MEPs Agree to Europe’s First-Ever EU Cybersecurity Law

On December 7th, members of the European Parliament (MEPs) and the Luxembourg Presidency of the EU Council of Ministers provisionally agreed to the text of the long awaited network and information security directive also...more

Business Litigation Alert: "Is Your Board of Directors Providing Sufficient Oversight for Cyber Attacks?"

Last month, we discussed the recent federal court decision that allows whistleblowers to sue board members directly for retaliation. Now, it seems as though board members are assuming a bigger role in managing another...more

Tips for Protecting Your Company Against Cyberattacks

Cybersecurity has become, as it should, an extremely important topic on company boards’ agendas. The main question on everyone’s mind is: “How can we eliminate this problem?” The answer, unfortunately, is that you can’t....more

Weltimmo v Hungarian DPA: Landmark Verdict on the Meaning of “Established”

In the case of Weltimmo s.r.o. v Nemzeti Adatvédelmi és Információszabadság Hatóság, the Court of Justice of the European Union (“CJEU”) handed down a landmark judgment in October 2015 on data protection legislation, tackling...more

California Amends Breach Notification Law: Unique New Refinements and Requirements

The California legislature has again amended the state’s breach notification statutes to impose new and unique requirements and refinements, adding further complexity to the patchwork of breach notification requirements....more

Highlights from the FTC’s Second “Start With Security” Initiative

On November 5, the FTC hosted its second “Start With Security” event in Austin, Texas in an effort to provide companies with practical tips and strategies for implementing effective data security....more

Data Breach Planning in 10 Easy Steps: How to Think Like A Litigator

For the first Tuesday in November, we have 10 easy steps to make sure that your data breach incident response planning is viewed from that pesky point of view of a litigator....more

[Webinar] The New Compliance Challenge: Protecting Confidential Assets From Cyber Threats and Malicious Insiders - Nov. 5th,...

The growing prevalence of cyber-security issues and insider breaches has put information security squarely on the agenda for many corporations – and increasingly in the realm of compliance. In this webinar, we discuss these...more

Data Breaches, Media Relations, and the Bottom Line

Data breaches are crisis moments that business must prepare for in many ways: not just in taking steps at prevention, but also mitigating losses, arranging for business continuity, complying with legal and regulatory...more

The End of the Safe Harbor Framework – and the Threat to Model Clauses and BCRs

Earlier last week, the European Court of Justice (CJEU) invalidated the Safe Harbor framework between the United States and the European Union -- effective immediately. This decision significantly disrupts the flow of data...more

Ashley Madison Breach Another Warning To Companies

Add dating website Ashley Madison to the list of large companies like Target, Home Depot and Michael’s that have had customer information stolen by hackers. Published reports say Ashley Madison is now facing multiple lawsuits...more

[Event] Retail Best Practices: Accommodating Disabilities with Acumen, Protecting Data with Diligence, and Avoiding Class Actions...

Topics covered will include: Accommodating Disabilities in The Retail Work Environment: A discussion of recent developments under the employment provisions of the Americans with Disabilities Act impacting...more

Fines Issued for Transfer of Customer Data in an M&A Asset Deal

Recent enforcement actions by the Bavarian Data Protection Authority (DPA) [Bayerisches Landesamt für Datenschutzaufsicht] highlight the importance of severe restrictions placed on the transfer of such data, even in the...more

Illinois Governor Vetoes Data Protection Bill; Suggests Revisions

Illinois Governor Bruce Rauner vetoed a bill amending the state’s data breach notification law on August 21, 2015, saying in a letter to the General Assembly that the bill “goes too far, imposing duplicative and burdensome...more

70 Results
|
View per page
Page: of 3

Follow Privacy Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×